International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P75 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P75

An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment


N.Jaswanth,J.Durga

Citation :

N.Jaswanth,J.Durga, "An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1350-1354, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I5P75

Abstract

Cloud Forensics under Cloud computing an on-demand paradigm becoming a well transformative technology in the computing now a day’s grabbing important attention towards pursuing in-depth analysis of security issues, migrations from disasters, outages experienced by many CSP today in cloud environment. In spite of better understanding about the domain this paper

Keywords

Cloud Computing, Cloud forensics, challenges, CSP, research issues.

References

[1]http://csrc.nist.gov/publications/nistpubs/800145/SP800-145.pdf
[2]http://www.rcfl.gov/downloads/documents/RCFL_N at_Annual07.pdf
[3]http://csrc.nist.gov/publications/nistpubs/80086/SP800-86.pdf
[4] http://www.cloudforensicsresearch.org
[5]http://cloudtimes.org/2012/11/05/the-basics-ofcloud-forensics.
[6]http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf
[7]http://www.crn.com/slideshows/cloud/240144284/th e-10-biggest-cloud-outages-of-2012.htm [8] http://cdn.ly.tl/talks/owade-paper.pdf
[9]http://www.dfinews.com/articles/2012/05/cloudforensics-service-fraas [10]http://www.igi-lobal.com/book/cybercrime-cloudforensics/69206 .  Cybercrime and Cloud Forensics: Applications for Investigation Process.